Linux cryptographic layer development
 help / color / mirror / Atom feed
 messages from 2026-05-15 21:15:13 to 2026-05-15 23:51:25 UTC [more...]

[PATCH v16 00/38] x86: Secure Launch support for Intel TXT
 2026-05-15 23:51 UTC  (33+ messages)
` [PATCH v16 01/38] tpm: Initial step to reorganize TPM public headers
` [PATCH v16 02/38] tpm: Move TPM1 specific definitions to the command header
` [PATCH v16 03/38] tpm: Move TPM2 "
` [PATCH v16 04/38] tpm: Move TPM common base "
` [PATCH v16 15/38] Documentation/security: Secure Launch kernel documentation
` [PATCH v16 21/38] lib/crypto: Add SHA1 support for pre-boot environments
` [PATCH v16 22/38] lib/crypto: Add SHA512 "
` [PATCH v16 23/38] x86: Allow WARN_trap() macro to be included in "
` [PATCH v16 24/38] x86/msr: Add variable MTRR base/mask and x2apic ID registers
` [PATCH v16 25/38] x86/boot: Slight refactor of the 5 level paging logic
` [PATCH v16 26/38] x86: Add early SHA-1 support for Secure Launch early measurements
` [PATCH v16 27/38] x86: Add early SHA-256 "
` [PATCH v16 28/38] x86: Add early SHA-384/512 "
` [PATCH v16 29/38] x86/tpm: Early startup TPM PCR extending driver
` [PATCH v16 30/38] x86/slaunch: Add MLE header and Secure Launch entrypoint to the core kernel
` [PATCH v16 31/38] x86/slaunch: Secure Launch kernel early boot initialization
` [PATCH v16 32/38] x86/slaunch: Secure Launch kernel late "
` [PATCH v16 33/38] x86/slaunch: Secure Launch SMP bringup support
` [PATCH v16 34/38] kexec/slaunch: Secure Launch kexec SEXIT support
` [PATCH v16 35/38] reboot/slaunch: Secure Launch SEXIT support on reboot paths
` [PATCH v16 36/38] x86/slaunch: Secure Launch late initcall platform module
` [PATCH v16 37/38] x86/efistub: EFI stub DRTM support for Secure Launch
` [PATCH v16 38/38] x86/boot: Legacy boot "

[PATCH v1] include: Remove unused crypto-ux500.h
 2026-05-15 23:21 UTC  (2+ messages)

[PATCH net v4 1/3] crypto/krb5, rxrpc: Fix lack of pre-decrypt/pre-verify length checks
 2026-05-15 23:05 UTC 


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox